This article is the fourth in a series that discusses how to use proxy commands and the Command Analyzer Change exit point. In the last article, we reviewed the validation-checking that an exit program should perform prior to processing command-related data passed to the program. In this article, we will look at the actual processing of this command-related data.

For some time now, IBM has been making the AS/400 family more powerful and versatile. With the introduction of Power Systems in 2008, the promise of one box that meets the demands of modern computing environments across multiple operating systems truly came of age.

But with this versatility comes increased exposure to threats from malicious code.